메뉴 건너뛰기




Volumn , Issue , 2009, Pages 204-218

The Mastermind attack on genomic data

Author keywords

Attacks; Genomic databases; Mastermind; Mitochondrial DNA; Privacy

Indexed keywords

CRYPTOGRAPHIC PROTOCOLS; DNA DATA; EFFICIENT IMPLEMENTATION; EXPERIMENTAL STUDIES; GENOMIC DATA; GENOMIC DATABASE; MITOCHONDRIAL DNA; PUBLIC KNOWLEDGE; REAL-WORLD;

EID: 70449627419     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2009.4     Document Type: Conference Paper
Times cited : (43)

References (40)
  • 4
    • 37249011239 scopus 로고    scopus 로고
    • Lossless compression of chemical fingerprints using integer entropy codes improves storage and retrieval
    • P. Baldi, R. W. Benz, D. Hirschberg, and S. Swamidass. Lossless compression of chemical fingerprints using integer entropy codes improves storage and retrieval. Journal of Chemical Information and Modeling, 47(6):2098-2109, 2007.
    • (2007) Journal of Chemical Information and Modeling , vol.47 , Issue.6 , pp. 2098-2109
    • Baldi, P.1    Benz, R.W.2    Hirschberg, D.3    Swamidass, S.4
  • 11
    • 51249185802 scopus 로고
    • Mastermind
    • V. Chvátal. Mastermind. Combinatorica, 3(3/4):325-329, 1983.
    • (1983) Combinatorica , vol.3 , Issue.3-4 , pp. 325-329
    • Chvátal, V.1
  • 12
    • 2042437650 scopus 로고    scopus 로고
    • Initial sequencing and analysis of the human genome
    • I. H. G. S. Consortium. Initial sequencing and analysis of the human genome. Nature, 409:860-921, 2001.
    • (2001) Nature , vol.409 , pp. 860-921
    • Consortium, I.H.G.S.1
  • 13
    • 33745567199 scopus 로고    scopus 로고
    • Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
    • Springer, S. Halevi and T. Rabin, editors
    • I. Damga°rd, M. Fitzi, E. Kiltz, J. B. Nielsen, and T. Toft. Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In S. Halevi and T. Rabin, editors, Theory of Cryptography, volume 3876 of Lecture Notes in Computer Science, pages 285-304. Springer, 2006.
    • (2006) Theory of Cryptography, Volume 3876 of Lecture Notes in Computer Science , pp. 285-304
    • Damgard, I.1    Fitzi, M.2    Kiltz, E.3    Nielsen, J.B.4    Toft, T.5
  • 15
    • 70449677016 scopus 로고    scopus 로고
    • Protocols for secure remote database access with approximate matching
    • In A. K. Ghosh, editor, Kluwer Academic Publishers
    • W. Du and M. J. Atallah. Protocols for secure remote database access with approximate matching. In A. K. Ghosh, editor, E-Commerce Security and Privacy: Advances in Information Security, Volume 2, pages 87-112. Kluwer Academic Publishers, 2001.
    • (2001) E-Commerce Security and Privacy: Advances in Information Security, Volume 2 , pp. 87-112
    • Du, W.1    Atallah, M.J.2
  • 16
    • 0242496951 scopus 로고    scopus 로고
    • Secure multi-party computation problems and their applications: A review and open problems
    • New York, NY, USA, ACM
    • W. Du and M. J. Atallah. Secure multi-party computation problems and their applications: a review and open problems. In NSPW '01: Proceedings of the 2001 workshop on New security paradigms, pages 13-22, New York, NY, USA, 2001. ACM.
    • (2001) NSPW '01: Proceedings of the 2001 Workshop on New Security Paradigms , pp. 13-22
    • Du, W.1    Atallah, M.J.2
  • 20
    • 67349153322 scopus 로고    scopus 로고
    • On the algorithmic complexity of the mastermind game with black-peg results
    • to appear
    • M. T. Goodrich. On the algorithmic complexity of the mastermind game with black-peg results. Information Processing Letters, ?:to appear, 2009.
    • (2009) Information Processing Letters ?
    • Goodrich, M.T.1
  • 21
    • 0016518550 scopus 로고
    • A linear space algorithm for computing maximal common subsequences
    • D. S. Hirschberg. A linear space algorithm for computing maximal common subsequences. Commun. ACM, 18(6):341-343, 1975.
    • (1975) Commun. ACM , vol.18 , Issue.6 , pp. 341-343
    • Hirschberg, D.S.1
  • 22
    • 45749158543 scopus 로고    scopus 로고
    • Algorithms for computing variants of the longest common subsequence problem
    • C. S. Iliopoulos and M. S. Rahman. Algorithms for computing variants of the longest common subsequence problem. Theor. Comput. Sci., 395(2-3):255-267, 2008.
    • (2008) Theor. Comput. Sci. , vol.395 , Issue.2-3 , pp. 255-267
    • Iliopoulos, C.S.1    Rahman, M.S.2
  • 24
    • 38549161042 scopus 로고    scopus 로고
    • A plan to capture human ddveristy in 1000 genomes
    • J. Kaiser. A plan to capture human ddveristy in 1000 genomes. Science, 319:395, 2008.
    • (2008) Science , vol.319 , pp. 395
    • Kaiser, J.1
  • 26
    • 35648976118 scopus 로고    scopus 로고
    • The diploid genome sequence of an individual human
    • S. Levy, G. Sutton, P. C. Ng, and et al. The diploid genome sequence of an individual human. PLOS Biology, 5(10):2113-2144, 2007.
    • (2007) PLOS Biology , vol.5 , Issue.10 , pp. 2113-2144
    • Levy, S.1    Sutton, G.2    Ng, P.C.3
  • 27
    • 24744469980 scopus 로고    scopus 로고
    • Power laws Pareto distributions and Zipf's law
    • M. Newman. Power laws, Pareto distributions, and Zipf's law. Contemporary Physics, 46(5):323-351, 2005.
    • (2005) Contemporary Physics , vol.46 , Issue.5 , pp. 323-351
    • Newman, M.1
  • 28
    • 0002114928 scopus 로고
    • The rise and fall of knapsack cryptosystems
    • C. Pomerance, editor, Am. Math. Soc.
    • A. M. Odlyzko. The rise and fall of knapsack cryptosystems. In C. Pomerance, editor, Cryptology and Computational Number Theory, pages 75-88. Am. Math. Soc., 1990.
    • (1990) Cryptology and Computational Number Theory , pp. 75-88
    • Odlyzko, A.M.1
  • 32
    • 78650226497 scopus 로고    scopus 로고
    • Privacy preserving set intersection based on bilinear groups
    • Darlinghurst, Australia, Australia, Australian Computer Society, Inc.
    • Y. Sang and H. Shen. Privacy preserving set intersection based on bilinear groups. In ACSC '08: Proceedings of the thirty-first Australasian conference on Computer science, pages 47-54, Darlinghurst, Australia, Australia, 2008. Australian Computer Society, Inc.
    • (2008) ACSC '08: Proceedings of the Thirty-first Australasian Conference on Computer Science , pp. 47-54
    • Sang, Y.1    Shen, H.2
  • 33
    • 33645072440 scopus 로고    scopus 로고
    • The race for the $1000 genome
    • R. F. Service. The race for the $1000 genome. Science, 311:1544-1546, 2006.
    • (2006) Science , vol.311 , pp. 1544-1546
    • Service, R.F.1
  • 37
    • 84976791819 scopus 로고
    • Bounds on the complexity of the longest common subsequence problem
    • J. D. Ullman, A. V. Aho, and D. S. Hirschberg. Bounds on the complexity of the longest common subsequence problem. J. ACM, 23(1):1-12, 1976.
    • (1976) J. ACM , vol.23 , Issue.1 , pp. 1-12
    • Ullman, J.D.1    Aho, A.V.2    Hirschberg, D.S.3
  • 38
    • 10944227231 scopus 로고    scopus 로고
    • Secure set intersection cardinality with application to association rule mining
    • J. Vaidya and C. Clifton. Secure set intersection cardinality with application to association rule mining. J. Comput. Secur., 13(4):593-622, 2005.
    • (2005) J. Comput. Secur. , vol.13 , Issue.4 , pp. 593-622
    • Vaidya, J.1    Clifton, C.2
  • 39
    • 0035895505 scopus 로고    scopus 로고
    • The sequence of the human genome
    • J. C. Venter, M. D. Adams, E. W. Myers, and P. W. Li et al. The sequence of the human genome. Science, 291:1304-1351, 2001.
    • (2001) Science , vol.291 , pp. 1304-1351
    • Venter, J.C.1    Adams, M.D.2    Myers, E.W.3    Li, P.W.4
  • 40
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • Washington, DC, USA, IEEE Computer Society
    • A. C. Yao. Protocols for secure computations. In Proc. of 23rd Symp. on Foundations of Computer Science, pages 160-164, Washington, DC, USA, 1982. IEEE Computer Society.
    • (1982) Proc. of 23rd Symp. on Foundations of Computer Science , pp. 160-164
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.